IPv6 auto discovery tool
☆98Oct 20, 2025Updated 7 months ago
Alternatives and similar repositories for v6disc
Users that are interested in v6disc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Entropy clustering of IPv6 networks, see https://ipv6hitlist.github.io/☆13Sep 24, 2018Updated 7 years ago
- IPv6 port scanner designed to be fast, aimed at Internet scanning and discovery☆180May 3, 2026Updated 2 weeks ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 9 months ago
- ☆22May 22, 2024Updated 2 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆108Apr 22, 2026Updated last month
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆47Feb 6, 2026Updated 3 months ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 6 months ago
- SI6 Networks' IPv6 Toolkit☆278Dec 2, 2024Updated last year
- Golang IPv6 address enumeration☆358May 27, 2019Updated 6 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Dec 12, 2024Updated last year
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- ☆42Oct 8, 2024Updated last year
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 10 months ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Nov 24, 2022Updated 3 years ago
- Terribad PrivEsc enumeration script for Windows systems☆15Oct 23, 2020Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- An entry level resource to learning bug bounty.☆28Apr 11, 2018Updated 8 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Oct 2, 2022Updated 3 years ago
- Yahoo subdomains for bug bounty☆22Mar 22, 2019Updated 7 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- When you request Google Chrome to save your password on a given website, it stores it in a "Login Data" file (sqlite database file). In o…☆10Feb 18, 2017Updated 9 years ago
- Quick and dirty scripts that don't really belong in a larger project☆34Oct 22, 2025Updated 7 months ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆33Dec 7, 2010Updated 15 years ago
- 2018大学生信息安全国赛pwn出题docker☆26Jun 23, 2018Updated 7 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 12 years ago
- DNS-over-ping(8)☆125Nov 14, 2022Updated 3 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- ☆11Apr 30, 2015Updated 11 years ago
- Playing with IPv6 for fun and profit☆123Apr 12, 2021Updated 5 years ago